bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
11:37 pm, May 23, 2015

Search Result

Search Tags:  cybersecuirty

Katz: Academia can't take same cyber steps as government

A hacker group called Lizard Squad finds a backdoor into federal computer networks. It's leveraging university supercomputers that also have access to government data. Jonathan Katz is director of the Maryland Cybersecurity Center at the University of Maryland. On In Depth with Francis Rose, be broke down the different ways hackers like Lizard Squad can penetrate your agency's network.

Tags: Jonathan Katz , technology , University of Maryland , In Depth

Thursday - 02/05/2015, 04:37pm EST
Listen

Jamie Barnett, Cybersecurity Practice Partner, Venable

CENTCOM's Twitter and YouTube accounts are back up and running after Islamic State sympathizers hacked the sites yesterday. The Defense Department says the attack lasted for about 30 minutes. The sites posted threatening messages about American troops and showed pro-Islamic State images. Retired Navy Rear Adm. Jamie Barnett is a partner for the cybersecurity practice at Venable. On In Depth with Francis Rose, he explained what the cybervandalism means for CENTCOM and national security.

Tags: Jamie Barnett , Navy , Venable , DoD , U.S. Cyber Command , In Depth

Tuesday - 01/13/2015, 04:10pm EST
Listen

Steve LaFountain, National Security Agency

This fall, five more schools will offer an intensive science, technology, engineering and math (STEM) education track to students who are serious about federal cybersecurity careers. These Centers of Academic Excellence are overseen jointly by the National Security Agency and the Homeland Security Department. Schools have to pass a meticulous screening process to qualify for the program. Steve LaFountain is dean of the NSA's College of Cyber. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss the new move.

Tags: NSA , STEM , Steve LaFountain , DHS , College of Cyber

Thursday - 07/31/2014, 08:52am EDT
Listen

Ken Ammon, Chief Strategy Officer, Xceedium

Agencies are getting smarter about cyber. The Homeland Security Department and General Services Administration are fine-tuning a contracting vehicle for tools that let agencies not only monitor their computer networks 24/7, but also fix things that go wrong. The umbrella term for the tools is continuous diagnostics and mitigation (CDM). Xceedium is a supplier of CDM software products. Ken Ammon, the chief strategy officer of Xceedium, told Federal Drive hosts Tom Temin and Emily Kopp what's in store for phase two of CDM.

Tags: Ken Ammon , Xceedium , Federal Drive , Tom Temin , Emily Kopp

Monday - 05/05/2014, 11:21am EDT
Listen

Cybercrime rises

PwC has released a new survey that indicates, cybercrime is the second most common type of fraud reported by financial firms, more than double the level across other industries. According to the report, 39 percent of financial services companies that suffered from economic crime last year said they had been hit by cybercrime, compared to 17 percent in other industries.

Tags: J.J. Green , Cyber Security Report

Monday - 03/10/2014, 05:55pm EDT

Senate Intelligence Committee finalizing version of cyber sharing bill

The bill would conform, mostly, with the House's most recent Cyber Intelligence Sharing and Protection Act. Both the House and Senate bills are trying to find common areas to incentivize private sector companies to share information on any malicious code their firms encounter, both by providing them with liability protections that would shield them from lawsuits that could otherwise follow from sharing information with competitors or with the government, and by convincing them that federal agencies are capable of securely communicating threat information between the private and public sectors.

Tags: technology , Congress , Senate Intelligence Committee , House Intelligence Committee , Mike Rogers , Saxby Chambliss , Dutch Ruppersberger , Keith Alexander , NSA , DHS , Mike McCaul , Jared Serbu

Wednesday - 10/09/2013, 06:24am EDT
Listen

Agencies exploring the right balance between open data, security

HHS is using big data to improve the cybersecurity of their systems, but also using a layered approach to protect the information. Commerce wants to improve the governance and usability of its data. USDA is creating a big data strategy.

Tags: technology , big data , HHS , Kevin Charest , Commerce , Simon Syzkman , NSF , Fen Zhao , USDA , Charles McClam , information sharing , Jason Miller

Friday - 09/27/2013, 05:39am EDT
Listen

Thrift Investment Board picks SAIC to run IT services

The FRTIB awarded Science Applications International Corporation (SAIC) a five-year, $224.5 million contract. SAIC beat out several competitors including incumbent Serco.

Tags: technology , acquisition , contacting , SAIC , SERCO , Federal Retirement Thrift Investment Board , IT services , Jason Miller

Monday - 08/12/2013, 05:33am EDT

DHS building actionable response plans for cyber attacks on critical infrastructure

Building off a project to assess the nation's overall cyber capabilities, the Department of Homeland Security has begun drawing up plans for how it would respond in the event of a range of cyber emergencies affecting critical infrastructure.

Tags: DHS , technology , Critical infrastructure , National Cybersecurity and Communications Integration Center , Larry Zelvin , Jared Serbu

Thursday - 08/08/2013, 05:41am EDT
Listen

DHS warns of online scams ahead of the Olympic Games

Homeland Security officials are warning fans of the Olympic Games to be wary of online hackers, who take advantage of highly-publicized events and popular news stories to entice users to click on malicious links that download viruses or prompt for credit card information.

Tags: Olympics , Cybersecurity Update , malware , DHS , technology , Federal Drive

Wednesday - 07/18/2012, 04:44pm EDT
  • 1
  •